General

  • Target

    free.exe1

  • Size

    10.2MB

  • Sample

    210715-ypjhcda5zs

  • MD5

    06f4534d20473c1e24f52b39b45ae322

  • SHA1

    2448f7702aa1177fdfd2a02b5a9a232f8d26170e

  • SHA256

    b1606b82326077efb530a20bc339d53a9dc3c5d150cc5c67deda3acb691d05cc

  • SHA512

    06548abcb901664a6f662e1182ed1ee584cb348532fdd741df54e71b8eea5bc3a148128297d6ca1e5624eca4d8b9ecf3b263fcef7ea5789a9fb645d8b2ff4071

Score
10/10

Malware Config

Targets

    • Target

      free.exe1

    • Size

      10.2MB

    • MD5

      06f4534d20473c1e24f52b39b45ae322

    • SHA1

      2448f7702aa1177fdfd2a02b5a9a232f8d26170e

    • SHA256

      b1606b82326077efb530a20bc339d53a9dc3c5d150cc5c67deda3acb691d05cc

    • SHA512

      06548abcb901664a6f662e1182ed1ee584cb348532fdd741df54e71b8eea5bc3a148128297d6ca1e5624eca4d8b9ecf3b263fcef7ea5789a9fb645d8b2ff4071

    Score
    10/10
    • Suspicious use of NtCreateUserProcessOtherParentProcess

    • Executes dropped EXE

    • Suspicious Office macro

      Office document equipped with 4.0 macros.

    • VMProtect packed file

      Detects executables packed with VMProtect commercial packer.

MITRE ATT&CK Matrix ATT&CK v6

Defense Evasion

Modify Registry

1
T1112

Discovery

System Information Discovery

2
T1082

Query Registry

1
T1012

Peripheral Device Discovery

1
T1120

Tasks